Book ChapterDOI
A Survey of Attacks on Ethereum Smart Contracts SoK
Nicola Atzei,Massimo Bartoletti,Tiziana Cimoli +2 more
- Vol. 10204, pp 164-186
TLDR
This work analyses the security vulnerabilities of Ethereum smart contracts, providing a taxonomy of common programming pitfalls which may lead to vulnerabilities, and shows a series of attacks which exploit these vulnerabilities, allowing an adversary to steal money or cause other damage.Abstract:
Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need of an external trusted authority. Since smart contracts handle and transfer assets of considerable value, besides their correct execution it is also crucial that their implementation is secure against attacks which aim at stealing or tampering the assets. We study this problem in Ethereum, the most well-known and used framework for smart contracts so far. We analyse the security vulnerabilities of Ethereum smart contracts, providing a taxonomy of common programming pitfalls which may lead to vulnerabilities. We show a series of attacks which exploit these vulnerabilities, allowing an adversary to steal money or cause other damage.read more
Citations
More filters
Proceedings ArticleDOI
Implementation and Execution of Blockchain Technology in the Field of Education
TL;DR: In this paper , the authors employ blockchain technology to address security concerns about the sharing of student educational credentials, and describe how to implement it as a decentralized application (DApp) based on the trials run, cost and performance analyses are also done.
Posted Content
A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement.
TL;DR: In this article, the authors propose a pattern-based solution based on a real-life use case: transportation of refrigerated goods, which allows the execution of automatable legal contract clauses, where its execution states are stored in an on-chain smart-contract and the logic needed to enforce it wraps it off-chain.
Posted Content
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts
TL;DR: Wang et al. as mentioned in this paper explored the possibility and existence of new social engineering attacks beyond smart contract honeypots, and presented two novel classes of Ethereum social engineering attack, Address Manipulation and Homograph.
Journal ArticleDOI
Blockchain-native mechanism supporting the circulation of complex physical assets
Lanju Kong,Min Xinping,Lanju Kong,Qingzhong Li,Yuan Liu,Baochen Zhang,Zhao Yongguang,Xiao Zongshui,Bin Guo +8 more
TL;DR: Wang et al. as discussed by the authors proposed a blockchain-native mechanism supporting complex physical assets, including a novel digital asset model and transaction validity guarantee protocol, which can fully describe different associations and their influence on the transaction execution order.
Proceedings ArticleDOI
Machine Learning Based Bug Prediction Engine For Smart Contracts
TL;DR: This study develops Machine Learning-based Bug Predictor for Solidity (MLBP-Solidity) which predicts files that would be reported by all the previous bug detection tools and achieves 91-99% accuracy, depending on the type of predicted bug.
References
More filters
Book
Isabelle/HOL: A Proof Assistant for Higher-Order Logic
TL;DR: This presentation discusses Functional Programming in HOL, which aims to provide students with an understanding of the programming language through the lens of Haskell.
Ethereum: A Secure Decentralised Generalised Transaction Ledger
TL;DR: Ethereum as mentioned in this paper is a transactional singleton machine with shared state, which can be seen as a simple application on a decentralised, but singleton, compute resource, and it provides a plurality of resources, each with a distinct state and operating code but able to interact through a message-passing framework with others.
Journal ArticleDOI
Formalizing and Securing Relationships on Public Networks
TL;DR: Protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer are discussed.
Proceedings ArticleDOI
On the Security and Performance of Proof of Work Blockchains
TL;DR: This paper introduces a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains and devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints.
Proceedings ArticleDOI
Making Smart Contracts Smarter
TL;DR: This paper investigates the security of running smart contracts based on Ethereum in an open distributed network like those of cryptocurrencies, and proposes ways to enhance the operational semantics of Ethereum to make contracts less vulnerable.